|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [RFC XEN PATCH v4 08/41] xen/pmem: hide NFIT and deny access to PMEM from Dom0
... to avoid the inference with the PMEM driver and management
utilities in Dom0.
Signed-off-by: Haozhong Zhang <haozhong.zhang@xxxxxxxxx>
---
Cc: Jan Beulich <jbeulich@xxxxxxxx>
Cc: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
Cc: George Dunlap <George.Dunlap@xxxxxxxxxxxxx>
Cc: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
Cc: Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx>
Cc: Stefano Stabellini <sstabellini@xxxxxxxxxx>
Cc: Tim Deegan <tim@xxxxxxx>
Cc: Wei Liu <wei.liu2@xxxxxxxxxx>
Cc: Gang Wei <gang.wei@xxxxxxxxx>
Cc: Shane Wang <shane.wang@xxxxxxxxx>
---
xen/arch/x86/acpi/power.c | 7 +++++++
xen/arch/x86/dom0_build.c | 5 +++++
xen/arch/x86/shutdown.c | 3 +++
xen/arch/x86/tboot.c | 4 ++++
xen/common/kexec.c | 3 +++
xen/common/pmem.c | 21 +++++++++++++++++++++
xen/drivers/acpi/nfit.c | 21 +++++++++++++++++++++
xen/include/xen/acpi.h | 2 ++
xen/include/xen/pmem.h | 13 +++++++++++++
9 files changed, 79 insertions(+)
diff --git a/xen/arch/x86/acpi/power.c b/xen/arch/x86/acpi/power.c
index 1e4e5680a7..d135715a49 100644
--- a/xen/arch/x86/acpi/power.c
+++ b/xen/arch/x86/acpi/power.c
@@ -178,6 +178,10 @@ static int enter_state(u32 state)
freeze_domains();
+#ifdef CONFIG_NVDIMM_PMEM
+ acpi_nfit_reinstate();
+#endif
+
acpi_dmar_reinstate();
if ( (error = disable_nonboot_cpus()) )
@@ -260,6 +264,9 @@ static int enter_state(u32 state)
mtrr_aps_sync_end();
adjust_vtd_irq_affinities();
acpi_dmar_zap();
+#ifdef CONFIG_NVDIMM_PMEM
+ acpi_nfit_zap();
+#endif
thaw_domains();
system_state = SYS_STATE_active;
spin_unlock(&pm_lock);
diff --git a/xen/arch/x86/dom0_build.c b/xen/arch/x86/dom0_build.c
index bf992fef6d..3e4be7c571 100644
--- a/xen/arch/x86/dom0_build.c
+++ b/xen/arch/x86/dom0_build.c
@@ -8,6 +8,7 @@
#include <xen/iocap.h>
#include <xen/libelf.h>
#include <xen/pfn.h>
+#include <xen/pmem.h>
#include <xen/sched.h>
#include <xen/sched-if.h>
#include <xen/softirq.h>
@@ -458,6 +459,10 @@ int __init dom0_setup_permissions(struct domain *d)
rc |= rangeset_add_singleton(mmio_ro_ranges, mfn);
}
+#ifdef CONFIG_NVDIMM_PMEM
+ rc |= pmem_dom0_setup_permission(d);
+#endif
+
return rc;
}
diff --git a/xen/arch/x86/shutdown.c b/xen/arch/x86/shutdown.c
index a87aa60add..1902dfe73e 100644
--- a/xen/arch/x86/shutdown.c
+++ b/xen/arch/x86/shutdown.c
@@ -550,6 +550,9 @@ void machine_restart(unsigned int delay_millisecs)
if ( tboot_in_measured_env() )
{
+#ifdef CONFIG_NVDIMM_PMEM
+ acpi_nfit_reinstate();
+#endif
acpi_dmar_reinstate();
tboot_shutdown(TB_SHUTDOWN_REBOOT);
}
diff --git a/xen/arch/x86/tboot.c b/xen/arch/x86/tboot.c
index 59d7c477f4..24e3b81ff1 100644
--- a/xen/arch/x86/tboot.c
+++ b/xen/arch/x86/tboot.c
@@ -488,6 +488,10 @@ int __init tboot_parse_dmar_table(acpi_table_handler
dmar_handler)
/* but dom0 will read real table, so must zap it there too */
acpi_dmar_zap();
+#ifdef CONFIG_NVDIMM_PMEM
+ acpi_nfit_zap();
+#endif
+
return rc;
}
diff --git a/xen/common/kexec.c b/xen/common/kexec.c
index c14cbb2b9c..8e9ea131e3 100644
--- a/xen/common/kexec.c
+++ b/xen/common/kexec.c
@@ -366,6 +366,9 @@ static int kexec_common_shutdown(void)
watchdog_disable();
console_start_sync();
spin_debug_disable();
+#ifdef CONFIG_NVDIMM_PMEM
+ acpi_nfit_reinstate();
+#endif
acpi_dmar_reinstate();
return 0;
diff --git a/xen/common/pmem.c b/xen/common/pmem.c
index aa0a1d166d..699f8a3322 100644
--- a/xen/common/pmem.c
+++ b/xen/common/pmem.c
@@ -18,6 +18,8 @@
#include <xen/errno.h>
#include <xen/list.h>
+#include <xen/iocap.h>
+#include <xen/paging.h>
#include <xen/pmem.h>
/*
@@ -120,3 +122,22 @@ int pmem_register(unsigned long smfn, unsigned long emfn,
unsigned int pxm)
return rc;
}
+
+#ifdef CONFIG_X86
+
+int __init pmem_dom0_setup_permission(struct domain *d)
+{
+ struct list_head *cur;
+ struct pmem *pmem;
+ int rc = 0;
+
+ list_for_each(cur, &pmem_raw_regions)
+ {
+ pmem = list_entry(cur, struct pmem, link);
+ rc |= iomem_deny_access(d, pmem->smfn, pmem->emfn - 1);
+ }
+
+ return rc;
+}
+
+#endif /* CONFIG_X86 */
diff --git a/xen/drivers/acpi/nfit.c b/xen/drivers/acpi/nfit.c
index 6f85d4d911..e15d47b352 100644
--- a/xen/drivers/acpi/nfit.c
+++ b/xen/drivers/acpi/nfit.c
@@ -202,6 +202,24 @@ static void __init acpi_nfit_register_pmem(struct
acpi_nfit_desc *desc)
}
}
+void acpi_nfit_zap(void)
+{
+ uint32_t sig = 0x4e494654; /* "TFIN" */
+
+ if ( nfit_desc.acpi_table )
+ write_atomic((uint32_t *)&nfit_desc.acpi_table->header.signature[0],
+ sig);
+}
+
+void acpi_nfit_reinstate(void)
+{
+ uint32_t sig = 0x5449464e; /* "NFIT" */
+
+ if ( nfit_desc.acpi_table )
+ write_atomic((uint32_t *)&nfit_desc.acpi_table->header.signature[0],
+ sig);
+}
+
void __init acpi_nfit_boot_init(void)
{
acpi_status status;
@@ -216,6 +234,9 @@ void __init acpi_nfit_boot_init(void)
map_pages_to_xen((unsigned long)nfit_desc.acpi_table, PFN_DOWN(nfit_addr),
PFN_UP(nfit_addr + nfit_len) - PFN_DOWN(nfit_addr),
PAGE_HYPERVISOR);
+
+ /* Hide NFIT from Dom0. */
+ acpi_nfit_zap();
}
void __init acpi_nfit_init(void)
diff --git a/xen/include/xen/acpi.h b/xen/include/xen/acpi.h
index 088f01255d..77188193d0 100644
--- a/xen/include/xen/acpi.h
+++ b/xen/include/xen/acpi.h
@@ -186,6 +186,8 @@ bool acpi_nfit_boot_search_pmem(unsigned long smfn,
unsigned long emfn,
unsigned long *ret_smfn,
unsigned long *ret_emfn);
void acpi_nfit_init(void);
+void acpi_nfit_zap(void);
+void acpi_nfit_reinstate(void);
#endif /* CONFIG_NVDIMM_PMEM */
#endif /*_LINUX_ACPI_H*/
diff --git a/xen/include/xen/pmem.h b/xen/include/xen/pmem.h
index 41cb9bb04f..d5bd54ff19 100644
--- a/xen/include/xen/pmem.h
+++ b/xen/include/xen/pmem.h
@@ -24,5 +24,18 @@
int pmem_register(unsigned long smfn, unsigned long emfn, unsigned int pxm);
+#ifdef CONFIG_X86
+
+int pmem_dom0_setup_permission(struct domain *d);
+
+#else /* !CONFIG_X86 */
+
+static inline int pmem_dom0_setup_permission(...)
+{
+ return -ENOSYS;
+}
+
+#endif /* CONFIG_X86 */
+
#endif /* CONFIG_NVDIMM_PMEM */
#endif /* __XEN_PMEM_H__ */
--
2.15.1
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxxx
https://lists.xenproject.org/mailman/listinfo/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |